Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

11/12/2024, 16:01

241211-tf61zszkez 10

18/02/2024, 14:57

240218-sbkrhsca46 10

Analysis

  • max time kernel
    15s
  • max time network
    17s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/02/2024, 14:57

Errors

Reason
Machine shutdown

General

  • Target

    ItachiNoSleep.exe

  • Size

    29.4MB

  • MD5

    0736b49f07b6ad466ced7d95d6e0f303

  • SHA1

    77d4af83b2a288771676ebdbeea8755f5825409d

  • SHA256

    43bf2f36a8da283a7bf5288822fdade5f2f5e420c01c840352162defdbce22e3

  • SHA512

    1ae1229bb306ab7ed290d074f02f10d67d00d82cd1805fe53aa42f2615b297e7a8671c2694ee9d8d180b28a5686cac3dd516a5840e3fbcefd3c904de10a228e7

  • SSDEEP

    786432:b/9ozzOd+SlaO70TskW0nf0p3w9ozzOd+SlaO70TskW0nf0p3e:JozzM+wBITe0cpmozzM+wBITe0cp

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops file in Program Files directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 14 IoCs
  • Modifies File Icons 3 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 38 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ItachiNoSleep.exe
    "C:\Users\Admin\AppData\Local\Temp\ItachiNoSleep.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Disables RegEdit via registry modification
    • Checks computer location settings
    • Modifies system executable filetype association
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Modifies Control Panel
    • Modifies File Icons
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4176
    • C:\Windows\System32\shutdown.exe
      "C:\Windows\System32\shutdown.exe" /r /t 0
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2028
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa39b5855 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:1348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Desktop\There.txt

    Filesize

    77B

    MD5

    2b609310f9aaffe3c7b852f86c393693

    SHA1

    34e6b392319ffe622524c29df0cd0e0422b22008

    SHA256

    7520cd6319e299b6f7ac32209c93a552cd067a427e797615ab2dcffc31043c31

    SHA512

    896bc71942fa6d7e0303b7d38e8a80cdd9526587e7bf433244c94bb3140c43d5cef2996f7a7971e0324fd54d7eb5ee8ecdb2a55e0c3b98ca4e0718d02c71706a

  • memory/4176-0-0x00007FF82D2C0000-0x00007FF82DD81000-memory.dmp

    Filesize

    10.8MB

  • memory/4176-1-0x00000000008B0000-0x0000000002620000-memory.dmp

    Filesize

    29.4MB

  • memory/4176-2-0x000000001D220000-0x000000001D230000-memory.dmp

    Filesize

    64KB

  • memory/4176-277-0x00007FF82D2C0000-0x00007FF82DD81000-memory.dmp

    Filesize

    10.8MB